Systems and methods for protecting private information in a mobile environment

a mobile environment and private information technology, applied in the field of protecting nonpublic information, can solve the problems of conventional systems that do not work well in mobile environments, and inability to protect private information in a mobile environmen

Inactive Publication Date: 2010-04-27
PALO ALTO RES CENT INC
View PDF11 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in a typical data-mining environment, the underlying data sets are not necessarily available for access.
Moreover, these conventional systems do not work well in mobile environments.
This is often unacceptable in a mobile environment.
However, information about mobile users is not always centralized and / or if centralized is not usually available from the network operator.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for protecting private information in a mobile environment
  • Systems and methods for protecting private information in a mobile environment
  • Systems and methods for protecting private information in a mobile environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025]FIG. 1 shows an overview of a first exemplary system for protecting non-public information 100 according to this invention. The system for protecting non-public information 100 is embedded within a home gateway 300 and connected to data source 400; a smartphone 600; a smartcard 800; a video viewing device 1010; an audio device 1020; a telecommunications device 1030 and public information source 900 over communication links 99. A requestor 150 submits a request for non-public information. The requestor 150 is a public or non-public entity such as an individual, an organization and / or a system seeking access to the non-public information secured by the system for protecting non-public information 100. The exemplary data source 400 may include, but is not limited to, travel, location, government, school, health, financial, sales and / or any known or later developed type of non-public information about a user. In various embodiments according to this invention, the non-public infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Techniques for protecting non-public information in a mobile environment are provided. A request for non-public information about users in a mobile environment is received. Privacy policies, non-public and optional public information about the users affected by the request are determined. An optional privacy impact indicator is determined based on how satisfying the request increases the current public information about the users. Crowds of users having similar attribute name / values are optionally determined. User and optional requestor privacy policies which associate threshold release criteria such minimum crowd size, minimum consideration with the non-public information are determined. A privacy agreement is reached for the disclosure of the requested non-public information based on the compatibility of the requester and user privacy policies. Privacy protecting transformations are optionally determined and applied to create crowds or groups associated with the requested attribute.

Description

INCORPORATION BY REFERENCE[0001]This application is related to: entitled “SYSTEMS AND METHODS FOR PROTECTING PRIVACY” by Terresa Lunt et al., filed Dec. 2, 2004 as U.S. patent application Ser. No. 11 / 003,688; herein incorporated by reference in its entirety.BACKGROUND OF THE INVENTION[0002]1. Field of Invention[0003]This invention relates to protecting non-public information.[0004]2. Description of Related Art[0005]Conventional systems for protecting information privacy determine quasi-identifiers in data sets useful in re-identifying individual subjects. These conventional systems attempt to generalize, hide or withhold quasi-identifiers in the data sets to protect the privacy of individuals. For example, a subject's salary information can be hidden within aggregate salary information for a group.[0006]Other conventional systems for protecting privacy attempt to generalize the information to prevent re-association with specific subjects. For example, some of these systems replace s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L9/32
CPCH04L63/102H04L63/0421
Inventor LUNT, TERESA FGREENE, DANIEL HGOLLE, PHILIPPE JBRUCE, RICHARD HSTADDON, JESSICA N
Owner PALO ALTO RES CENT INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products